Professional Documents
Culture Documents
ATP 6-02.12 Department of Defense Information Network-Army Planning Techniques
ATP 6-02.12 Department of Defense Information Network-Army Planning Techniques
12
Contents
Page
PREFACE..................................................................................................................... v
INTRODUCTION ........................................................................................................ vii
Chapter 1 PLANNING OVERVIEW ........................................................................................... 1-1
Section I – Operational Environment Overview ................................................... 1-1
Operational Environment ........................................................................................... 1-1
Threats....................................................................................................................... 1-2
Section II – Planning Overview .............................................................................. 1-4
Planning Processes ................................................................................................... 1-4
Operational Environment Considerations .................................................................. 1-5
Coordination With Other Staff Elements ................................................................... 1-6
Section III – Network Overview .............................................................................. 1-7
Joint Network ............................................................................................................. 1-7
Army Network ............................................................................................................ 1-7
Mission Partner Environment .................................................................................... 1-8
Chapter 2 SIGNAL IN THE MILITARY DECISION-MAKING PROCESS ................................. 2-1
Signal Staff Estimate ................................................................................................. 2-1
Defining Signal Requirements ................................................................................... 2-3
Primary, Alternate, Contingency, and Emergency Communications Plan ................ 2-4
Paragraph 5 of an Operations Order ......................................................................... 2-6
Annex H (Signal) ....................................................................................................... 2-6
Attachments to Annex H (Signal) ............................................................................ 2-10
Chapter 3 OTHER PLANNING PROCESSES AND PRODUCTS ............................................ 3-1
Section I – Network Transport and Information Services ................................... 3-1
Satellite Communications Transport ......................................................................... 3-1
Satellite Access Requests ......................................................................................... 3-3
Line-of-Sight Transport .............................................................................................. 3-6
Tropospheric Scatter ................................................................................................. 3-6
Combat Net Radios ................................................................................................... 3-7
Link-16 ....................................................................................................................... 3-9
Information Services .................................................................................................. 3-9
Regional Hub Node or Department of Defense Gateway Coordination .................. 3-10
ATP 6-02.12 i
Contents
Figures
Figure 2-1. Sample Annex H (Signal) format ................................................................................. 2-6
Figure 2-2. Sample Annex H, Appendix and Tabs ...................................................................... 2-10
Figure 3-1. Army Centralized Army Service Request System conflict flags .................................. 3-4
Figure 3-2. Retransmission operations .......................................................................................... 3-8
Figure 4-1. Sample link establishment priorities ............................................................................ 4-5
Figure A-1. Tab C to Appendix 2–Network node allocation and organization ............................... A-3
Figure A-2. Example Tab C to Appendix 3–Voice, video, and data logical network diagram ....... A-6
Figure A-3. Sample Tab E to Appendix 3–Upper tier satellite transmission diagram ................... A-8
Figure A-4. Tab B–Retransmission network diagram .................................................................. A-10
Figure A-5. Sample Tab I–Mission command information systems allocation and
interconnections ....................................................................................................... A-11
Tables
Table 2-1. Signal staff estimate ...................................................................................................... 2-3
Table 2-2. Example primary, alternate, contingency, and emergency communications plan by
warfighting function ..................................................................................................... 2-5
Table 3-1. Network hardening techniques ................................................................................... 3-15
Table 3-2. Automated Communications Engineering Software signal operating instructions data
requirements ............................................................................................................. 3-17
Table A-1. Cybersecurity incident battle drill ..................................................................................A-2
Table A-2. Voice over internet protocol phone book. .....................................................................A-7
Table A-3. Sample Appendix 4–Spectrum management operations emitter list .........................A-12
Table B-1. Example Joint Network Node cut sheet ........................................................................B-2
Table B-2. Tactical flexible multiplexer settings .............................................................................B-3
Table B-3. Sample Command Post Node cut sheet ......................................................................B-4
Table B-4. Sample Tactical Communications Node cut sheet .......................................................B-5
Table B-5. Sample Point of Presence cut sheet ............................................................................B-6
Table B-6. Sample Satellite Transportable Terminal cut sheet ......................................................B-8
Table B-7. Sample Phoenix terminal cut sheet ..............................................................................B-9
This chapter provides an overview of signal planning. It starts with a discussion of the
operational environment and threats. The chapter introduces planning processes,
operational environment considerations, and coordination with other staff elements.
This chapter also gives a brief overview of the joint and Army networks.
OPERATIONAL ENVIRONMENT
1-2. Factors that affect operations extend far beyond the boundaries of a commander’s assigned area of
operations. An area of operations is an operational area defined by a commander for land and maritime forces
that should be large enough to accomplish their missions and protect their forces (JP 3-0). Commanders and
their staffs seek to develop and maintain an understanding of their operational environment. An operational
environment is a composite of the conditions, circumstances, and influences that affect the employment of
capabilities and bear on the decisions of the commander (JP 3-0). An operational environment encompasses
physical areas of the air, land, maritime, and space domains, as well as cyberspace and the electromagnetic
spectrum.
1-3. Army forces may conduct operations across multiple domains to gain freedom of action for other
members of the joint force. The air, land, maritime, space, and cyberspace domains, and their effects on
operations are closely interrelated. The complex relationships between the warfighting domains require a
cross-domain understanding of the operational environment. Signal leaders must understand the available
communications capabilities and interoperability challenges of communications support in each domain. A
thorough understanding helps identify opportunities for the command to coordinate with unified action
partners and converge effects when operating throughout the multi-domain battlefield.
1-4. Understanding the operational environment is essential for signal leaders, engineers, planners, system
operators, spectrum managers, system administrators, and cybersecurity professionals to plan and execute
effective signal support. Signal Soldiers must understand signal flow from the end user, through the local
area network, through the wide-area network, and the Department of Defense information network-Army
(DODIN-A).
CONGESTED ENVIRONMENT
1-5. Today, all joint force operations depend on assured electromagnetic spectrum access throughout the
operational environment (JP 6-0). All forces and supporting agencies depend on the electromagnetic
spectrum for communications, information collection, and electromagnetic warfare (EW) capabilities in
support of operations in the air, land, maritime, space, and cyberspace domains. Signal systems rely on the
electromagnetic spectrum for network transport. For this reason, gaining and maintaining access to the
electromagnetic spectrum is critical for signal support to joint and Army operations.
1-6. Within the electromagnetic spectrum, joint forces contend with civil agencies, commercial entities,
allied forces, and adversaries for the use of a common electromagnetic spectrum resource (ATP 6-02.70).
Competition for the finite available bandwidth results in a congested electromagnetic spectrum, especially
when operating in developed nations.
1-7. Signal staffs plan communications and network capabilities to support all anticipated requirements in
their operational area. However, in a congested electromagnetic operational environment, there might not be
adequate satellite bandwidth and spectrum availability to support all missions. Signal leaders must clearly
articulate the limitations and expected level of degradation, so commanders can make appropriate risk
decisions and align the available capabilities with their priorities (FM 6-02).
CONTESTED ENVIRONMENT
1-8. Threat cyberspace and EW capabilities jeopardize U.S. freedom of action in cyberspace and the
electromagnetic spectrum. Because communications are a key command and control enabler, U.S. military
communications and information networks present high-value targets. Peer threats and other adversaries
understand the extent of U.S. forces’ reliance on communications and automated information systems.
Enemies and adversaries are likely to contest U.S. use of cyberspace and the electromagnetic spectrum across
the conflict continuum to deny operational access and diminish the effectiveness of U.S. and allied forces.
1-9. A broad array of threat actors challenges the joint force’s freedom of action in space, cyberspace, and
the electromagnetic spectrum. For example, an enemy that jams positioning, navigation, and timing satellites
may render precision fires inaccurate. Signal elements must secure and protect their own systems and be
prepared to operate with degraded communications and reduced access to cyberspace and space capabilities.
1-10. Planners must synchronize the scheme of signal support with cyberspace, EW, intelligence, space, and
other information-related capabilities to achieve and maintain freedom of action in contested cyberspace and
the electromagnetic spectrum while denying the same to adversaries. Synchronization is the arrangement of
military actions in time, space, and purpose to produce maximum relative combat power at a decisive place
and time (JP 2-0). Synchronization of capabilities across multiple domains and warfighting functions
maximizes their complementary effects in and through cyberspace and the electromagnetic spectrum.
1-11. While enemy action might cause a degraded environment, degraded capabilities may also occur
because of insufficient resources to support all communications requirements. For example, inadequate
communications satellite capacity in an operational area may cause congestion and network latency. Jamming
or unintentional electromagnetic interference may also cause degradation. The architecture of the tactical
network implements redundant communications paths to improve reliability in a degraded environment.
Careful signal planning may also mitigate degradation of signal capabilities, whether the degradation occurs
naturally or results from hostile actions.
THREATS
1-12. A threat is any combination of actors, entities, or forces that have the capability and intent to harm
United States forces, United States national interests, or the homeland (ADP 3-0). Threats may include
individuals, organized or unorganized groups, paramilitary or military forces, nation-states, or national
alliances.
1-13. Threats can be broadly categorized as adversaries, enemies, or insiders. An adversary is a party
acknowledged as potentially hostile to a friendly party and against which the use of force may be envisaged
(JP 3-0). An enemy is a party identified as hostile against which the use of force is authorized (ADP 3-0).
Insider threats (see paragraphs 1-25) present unique challenges because they are trusted individuals with
access to Army capabilities and sensitive operational information.
Peer Threats
1-14. Peer threats employ their resources across multiple domains to exploit U.S. vulnerabilities. They use
their capabilities to create lethal and nonlethal effects across the operational environment. Peer threats have
demonstrated advanced capabilities in long-range precision fires, integrated air defense, and EW. These
threat capabilities demand changes to signal tactics, techniques, and procedures to counter the risks they
present.
1-15. Peer threat forces are equally well equipped with the latest technologies as well as the will to use them.
Peer threats have capabilities that can directly challenge the United States in all domains. This includes
attacks on U.S. satellite communications platforms, links, and terrestrial segments; effects on positioning,
navigation, and timing; information warfare and offensive cyberspace operations; and effects in cyberspace
and the electromagnetic spectrum designed to deny, disrupt, or exploit U.S. reliance on information systems
and networks.
1-16. Peer threats consider U.S. communications, command and control nodes, massed formations, and
critical infrastructure key targets during large-scale combat operations. Signal planners should consider
positioning radio frequency emitters, such as satellite communications antennas and line-of-sight radio
systems, away from major command posts to minimize loss of life. Also, to minimize and command and
control capabilities if an enemy targets the communications systems with lethal fires.
Hybrid Threat
1-17. A hybrid threat is the diverse and dynamic combination of regular forces, irregular forces, terrorists,
or criminal elements acting in concert to achieve mutually benefitting effects (ADP 3-0). Hybrid threats seek
to exploit asymmetric advantages over an adversary to avoid engaging in direct combat.
1-18. Hybrid threats may employ cyberspace attack and exploitation, battlefield jammers, and space-based
capabilities, such as anti-satellite weapons, to disrupt U.S. communications; positioning, navigation, and
timing; synchronization; and freedom of maneuver.
Information Warfare
1-19. Information warfare refers to a threat’s use of information activities, such as cyberspace attacks and
EW, to gain an information advantage. The threat construct of information warfare merges the disciplines of
EW, deception, lethal fires, information protection, perception management, and cyberspace operations into
a mutually supporting, integrated capability.
1-20. Adversaries recognize the advantages information warfare activities can provide their tactical
commanders. Therefore, they strive to integrate information warfare planning and activities in all tactical
missions and battles. Because threat actors integrate their information warfare capabilities, a coordinated and
synchronized response is essential. The countermeasures to defend against these capabilities are a
combination of signal, cyberspace operations, electromagnetic protection, space, and other information-
related capabilities in all domains, along with intelligence and operations security support.
1-21. Signal planners should collaborate closely with cyberspace, EW, space, and intelligence staff when
formulating signal support plans to ensure an integrated response to threat information warfare activities.
Refer to TC 7-100 for more information about hybrid threats and information warfare.
INSIDER THREAT
1-22. Insider threats present a significant risk to military operations. An insider threat is a person with
placement and access who intentionally causes loss or degradation of resources or capabilities or
compromises the ability of an organization to accomplish its mission through espionage, providing support
to international terrorism, or the unauthorized release or disclosure of information about the plans and
intentions of U.S. military forces (AR 381-12). Insider threats are hostile actors who intentionally
compromise national security through deliberate actions. Insider threat is not to be confused with operations
security or cybersecurity risks, where sensitive operational information may become accidentally
compromised and place U.S. operations or personnel at risk.
1-23. Past cases of insider threats have demonstrated that coworkers, associates, friends, and supervisors of
those engaging in espionage or terrorist activity commonly overlook potential threat indicators. If these
indicators were reported and investigated, they might have minimized the damage to national security or
saved the lives of U.S. personnel. Signal planners should maintain awareness of insider threat indicators.
They should also limit access to sensitive operational information to those with a valid clearance and need to
know.
PLANNING PROCESSES
1-25. Planning is the art and science of understanding a situation, envisioning a desired future, and
determining effective ways to bring that future about (ADP 5-0). Planning helps leaders understand
situations; develop solutions to problems; direct, coordinate, and synchronize actions; prioritize efforts, and
anticipate events. Signal planners follow the same planning processes as other staff sections.
1-26. Planning requires creative application of doctrine, units, and resources. To plan effective signal
support, G-6 and S-6 planners must understand not only signal doctrine but also the fundamentals of
maneuver doctrine. If the signal staff does not understand the terms movement to contact or retrograde, they
cannot develop plans to support those tactical tasks. Refer to ADP 3-0 for the fundamentals of unified land
operations. Refer to ADP 3-90 for the fundamentals of offense and defense.
1-27. DODIN-A planners use network automation planning and management tools to facilitate
communications planning, engineering, activation, and modification. Automation tool functions include—
Create and modify databases for communications system equipment and organizations.
Define the network topology based on sites and by organizations.
Create and modify subordinate unit tasks, responsibilities and schedules, and track performance.
Conduct feasibility analyses using modeling and simulation.
Create, modify, and support distribution of communications plans and orders communications
annexes; joint communications-electronics operating instructions; joint restricted frequency lists;
and communications service requests.
Perform detailed network planning and engineering for a joint force network, including—
Circuit switch planning and engineering.
Voice network planning and engineering.
Data network planning and engineering.
Virtual network planning and engineering.
Video network planning and engineering.
Defense Information Systems Network organizational messaging service planning and
engineering.
Message switch planning and engineering.
Backbone transmission systems planning and engineering across the electromagnetic
spectrum, including satellite communications.
Radio network planning and engineering.
Engineering plans and orders.
Coordination for link and network activations/deactivations.
Coordination for and integration with host-nation communications system resources into the
joint and multinational network.
OPERATIONS STAFF
1-36. Signal planners must maintain continual coordination with the G-3 or S-3 staff. The G-3 or S-3 is the
chief of the movement and maneuver warfighting function and the principal staff officer responsible for all
matters concerning training, operations and plans, and force development and modernization. In addition to
coordinating the activities of the movement and maneuver warfighting function, the operations officer is the
primary staff officer for integrating and synchronizing the operation as a whole for the commander (FM 6-
0).
1-37. The G-3 or S-3 ensures warfighting function integration and synchronization across the planning
horizons in current operations integration, future operations, and plans integrating cells. The G-6 or S-6
collaborates closely with the G-3 or S-3 to understand the commander’s intent and concept of operations and
ensures signal plans adequately support the proposed course of action.
INTELLIGENCE STAFF
1-38. G-6 or S-6 planners need an understanding of the current threat situation and electromagnetic order of
battle to plan survivable communications. Continual collaboration with the G-2 or S-2 section throughout
planning and operations ensures signal staffs understand the threat situation and can plan and implement
appropriate countermeasures.
LOGISTICS STAFF
1-43. Sustainment is critical to sustained operations. The ability of operators and crews to maintain and repair
signal systems is limited to replacement of onboard spares. The logistics staff and maintenance support units
maintain most spare parts. Supply points and maintenance collection points are essential to mission success
and operate throughout the corps and division areas of operations.
Supply
1-44. Maintenance organizations require repair parts as well as tools and test equipment to execute their field
and sustainment maintenance missions. Replenishment of shop stock and bench stock is critical to preserve
readiness (ATP 4-33).
Maintenance
1-45. Each maneuver brigade has an assigned brigade support battalion with a forward support company and
a field maintenance company. In the other brigades, the forward support company supports the maneuver
battalions. The field maintenance company supports the brigade headquarters and other non-maneuver
elements in the brigade.
1-46. In the maneuver battalion, the S-6 works in conjunction with the logistics staff, support operations,
communications-electronics maintenance shop, and the forward support company commander to develop a
comprehensive maintenance plan. The maintenance plan includes coordination for contractor field service
representative support.
1-47. Some units in the brigade have limited or no organic field maintenance capability or capacity. These
units normally receive field maintenance support or augmentation from a supporting maintenance
organization.
JOINT NETWORK
1-49. The Department of Defense information network (DODIN) is the set of information capabilities, and
associated processes for collecting, processing, storing, disseminating, and managing information on demand
to warfighters, policy makers, and support personnel, whether interconnected or stand-alone (JP 6-0).
DODIN includes owned and leased communications and computing systems and services, software
(including applications), data, security services, other associated services, and national security systems.
1-50. As the Department of Defense (DOD) portion of cyberspace, the DODIN interacts with, and provides
connections to, national and global cyberspace. The DODIN consists of joint capabilities provided by the
Defense Information Systems Agency combined with Service-specific capabilities provided by the Army,
Navy, Air Force, and Marine Corps.
1-51. The joint force depends on the DODIN to connect strategic, operational, and tactical commanders
across the globe. When properly secured, operated, and defended, the network enables the right users to
access the right information at the right time, with the right security measures in place. The DODIN shares
common configurations across all Services enabling real-time collaboration and synchronization with joint
mission partners.
ARMY NETWORK
1-52. The Department of Defense information network-Army is an Army-operated enclave of the Department
of Defense information network that encompasses all Army information capabilities that collect, process,
store, display, disseminate, and protect information worldwide (ATP 6-02.71). The DODIN-A includes all
Army automated information systems and networks, including the stand-alone networks supporting
intelligence, sustainment, medical, Army special operations forces, Army National Guard, and United States
Army Reserve.
1-53. The tactical internet is the deployed portion of the DODIN-A. The deployed portion of the network is
functionally similar to the commercial Internet because the communications infrastructure uses many of the
same technologies. From a network planning and management standpoint, the tactical internet divides into
the upper tier and the lower tier.
Note. Refer to ATP 6-02.53 for more information about the lower tier tactical internet.
configurable to provide secure tactical access for the coalition or commercial networks to support both civil
and military operations.
1-62. American, British, Canadian, Australian, and New Zealand standards provide network planners with
additional planning techniques to integrate mission partner networks. The joining, membership, and exiting
instructions provide the processes and technical configurations for access to the mission partner network.
1-63. The joining, membership, and exiting instructions provide users with a template for connection of joint
services and mission partners in a trusted federated mission network that is consistent and coherent across
the DOD. The joining, membership, and exiting instructions may be used as a template to guide establishment
of a federation of networks to support any event with a unique security classification level information and
data exchange environment shared by all mission partners electing to connect (CJCSI 5128.01).
This chapter discusses the role of signal staffs in the military decision-making process.
It discusses the signal staff estimate; definition of signal requirements; primary,
alternate, contingency, and emergency communications planning; Paragraph 5 of an
operation order; Annex H (Signal) to an operation order; and attachments to Annex H.
2-2. The G-6 or S-6 staff develops and continually updates the signal staff estimate. At a minimum, the
staff maintains a running estimate of friendly capabilities while in garrison or when not actively engaged in
operations. The signal staff estimate includes all relevant signal information, including a mission analysis
chart outlining—
Signal equipment on-hand.
Equipment in-use, non-mission capable, and available.
Capabilities of available communications systems.
Projected radio retransmission sites.
Combat net radio coverage.
Status of communications and automated information systems.
Projected communications node locations.
2-3. The staff immediately begins updating the running estimate upon receipt of a mission. They continue
to build and maintain their running estimate throughout planning, preparation, execution, and assessment.
2-4. The staff estimate outlines the G-6 or S-6 and signal elements’ ability to support proposed courses of
action. Signal planners evaluate the communications and network requirements for each proposed course of
action against the available signal support. Evaluating the available signal support includes considering the
capabilities and limitations of available signal systems. If signal elements cannot support a proposed course
of action, the running estimate helps identify the shortfall.
FACTS
2-5. A fact is something known to exist or have happened or a statement that is known to be true. A
statement of truth or a statement thought to be true at the time. Facts related to the operational variables
PMESII-PT and mission variables METT-TC help staffs develop situational understanding. Facts may be
truthful, but not relevant. Planners should list facts that relate directly to a proposed course of action to
minimize distractors in decision making. Facts concerning the operational and mission variables serve as the
basis for developing situational understanding during planning. When listing facts, planners are careful they
are directly relevant to a COA or help commanders make a decision.
ASSUMPTIONS
2-6. An assumption is a specific supposition of the operational environment that is assumed to be true, in
the absence of positive proof, essential for the continuation of planning (JP 5-0). Assumptions address gaps
in knowledge that are critical for the planning process to continue. Planners should only include assumptions
that add value to the planning process.
2-7. Commanders and staffs continuously question whether their assumptions are valid throughout the
planning process. Key points concerning the use of assumptions include—
Assumptions must be logical, realistic, and considered likely to be true, not based on
preconceptions.
Assumptions are necessary for continued planning. If the assumption does not directly affect the
decision at hand, it adds no value to the process and increases the chance of an invalid decision.
Too many assumptions result in a higher probability that the plan or proposed solution may be
invalid.
The use of assumptions requires the staff to develop branches to execute if one or more key
assumptions prove false.
Often, an unstated assumption may prove more dangerous than a stated assumption proven wrong.
Planners should replace assumptions with the relevant facts, as they become known.
CIVIL CONSIDERATIONS
2-10. The G-2 or S-2 gathers and analyzes information on civil considerations in the area of operations during
intelligence preparation of the battlefield. The G-6 or S-6 should include civil considerations that affect signal
support in their running estimate.
2-14. The staff identifies signal requirements based on the operational capability required to accomplish the
mission, not by a particular unit or communications assemblage. Accurately defining requirements simplifies
the process of validation and helps the chain of command source the capability when requesting
augmentation. In coordination with the G-2 or S-2 and G-3 or S-3, the G-6 or S-6 determines—
Services required by type and quantity—
Non-classified Internet Protocol Router Network (NIPRNET).
SECRET Internet Protocol Router Network (SIPRNET).
Joint Worldwide Intelligence Communications System.
Secure and non-secure voice.
Video teleconferencing.
Single-channel radios.
Single-channel radio retransmission.
helps ensure communications availability if the primary means of communication fails. Table 2-2 shows an
example of a simple PACE plan for one phase of an operation, aligned with warfighting functions.
Table 2-2. Example primary, alternate, contingency, and emergency communications plan by
warfighting function
Movement and
Intelligence Fires Sustainment
Maneuver
Primary VHF (CMD net) VHF (O&I) AFATDS VHF (A&L)
Alternate TACSAT JBCP VHF (voice) JBCP
Contingency JBCP TACSAT (voice) VHF (digital) TACSAT (voice)
Emergency HF (chat) TIGR JBCP HF (chat)
Legend:
AFATDS Advanced Field Artillery Tactical Data JBCP Joint Battle Command Platform
System
A&L administrative and logistics O&I operations and intelligence
CMD Command TACSAT tactical satellite
FM frequency modulation TIGR tactical ground reporting
HF high frequency VHF very high frequency
ANNEX H (SIGNAL)
2-22. Commanders and their staffs use Annex H (Signal) to describe how signal elements support the concept
of operations described in the base plan or order. The G-6 or S-6 develops Annex H (Signal) using the five-
paragraph attachment format. See figure 2-2, pages 2-6 through 2-9.
[CLASSIFICATION]
Place the classification at the top and bottom of every page of the attachments. Place the classification marking
at the front of each paragraph and subparagraph in parentheses. Refer to AR 380-5 for classification and
release marking instructions.
Copy ## of ## copies
Issuing headquarters
Place of issue
Date-time group of signature
Message reference number
Include the full heading if attachment is distributed separately from the base order or higher-level attachment.
a. List maps and charts first. Map entries include series number, country, sheet names or numbers, edition, and
scale.
c. Doctrinal references for signal support include FM 5-0, FM 6-02, ATP 6-02.45, ATP 6-02.53, ATP 6-02.54,
ATP 6-02.60, ATP 6-02.70, ATP 6-02.71, and ATP 6-02.75.
(U) Time Zone Used throughout the Order: Write the time zone established in the base plan or order.
(U) Task Organization: Describe the organization of forces (to include attachments and detachments) to/from
the issuing headquarters and their command and support relationships. State when each attachment or
detachment is effective (for example, on order, on commitment of the reserve). Refer to Annex A (Task
Organization) if long or complicated.
[CLASSIFICATION]
ANNEX H (SIGNAL) TO OPERATION PLAN/ORDER [number] [(code name)]—[issuing
headquarters] [(classification of title)]
1. (U) Situation. Include information affecting signal support that paragraph 1 of the operation plan or
operation does not cover, or that needs expansion.
a. (U) Area of Interest. Describe the area of interest, which includes the area of influence in all five domains
and the electromagnetic spectrum as it relates to signal support. Refer to Annex B (Intelligence) as required.
This is an opportunity to define the cyber area of interest, which does not always align with the physical area
of interest, and is arguably much larger. Include key concentration points of network (regional hub node,
regional cyber center, joint regional security stack locations, and tactical hub node placement, if outside the
area of operations).
b. (U) Area of Operations. Describe the area of operations as it relates to signal support. Refer to Appendix 2
(Operation Overlay) to Annex C (Operations).
(1) (U) Terrain. Describe the aspects of physical and logical terrain (including key terrain in cyberspace and
the electromagnetic spectrum) that impact signal support. Refer to Annex B (Intelligence) and Appendix 12
(Cyberspace Electromagnetic Activities) to Annex C (Operations) as required.
(2) (U) Weather. Describe all critical weather aspects that impact signal support such as precipitation, wind,
and solar weather that also may impact network availability or reliability in the area of operations. Refer to
Annex B (Intelligence) as required.
c. (U) Enemy Forces. List known and templated locations and activities of enemy communications, cyber, and
electromagnetic warfare units that may influence the area of operations or area of interest. List enemy
capabilities (including cyber and electromagnetic warfare) that impact signal support. State expected enemy
courses of action that may impact friendly ability to communicate. Refer to Annex B (Intelligence) as required.
d. (U) Friendly Forces. Briefly identify the signal mission of friendly forces and the objectives, goals, and
missions of civilian organizations that impact support. Refer to Annex A (Task Organization) and Annex C
(Operations) as required.
(1) (U) Higher Headquarters Two Levels Up. Identify the higher headquarters mission and commander’s intent
two echelons above.
(2) (U) Higher Headquarters One Level Up. Identify the higher headquarters mission, commander’s intent, and
concept of operations one echelon above.
(3) (U) Missions of Adjacent Units. Identify and state the missions of adjacent units and other units whose
actions have a significant impact on the issuing headquarters.
(4) (U) Signal Support Impact of Adjacent Units. Identify and state the missions of adjacent units and other
units whose actions have a significant impact on the issuing headquarters’ signal support.
e. (U) Interagency, Intergovernmental, and Nongovernmental Organizations. Identify and state the objectives
or goals of those non-Department of Defense organizations that have a significant role within the area of
operations. Refer to Annex V (Interorganizational-Interagency Coordination) as required.
[page number]
[CLASSIFICATION]
Figure 2-1. Sample Annex H (Signal) format (continued)
[CLASSIFICATION]
ANNEX H (SIGNAL) TO OPERATION PLAN/ORDER [number] [(code name)]—[issuing
headquarters] [(classification of title)]
f. (U) Risk. State the risk to mission, risk to network, and risk to personnel if the concept of signal support is
not followed or supported. Identify entry points into cyberspace, which are higher vulnerability areas, such as
physical nodes connected to commercial networks and virtual local area network traffic.
2. (U) Mission. Support [State the mission of the functional area in support of the base plan or order.].
3. (U) Execution.
a. (U) Concept of Signal Support. Describe how signal elements support the commander’s intent and concept
of operations, by phase, as described in the base plan or order. Describe the templated locations of all command
and control nodes including command posts and retransmission sites needed to support the concept of
operations. Describe the systems and capabilities residing at each of the command posts to enable primary,
alternate, contingency, and emergency communication to higher, subordinate, and adjacent units as required.
Define the primary, alternate, contingency, and emergency communication plan as it is nested within the
concept of signal support. Define triggers to transition command and control and technical channels across the
various command posts throughout the operation. Establish the priorities of support to units for each phase of
the operation. Refer to Annex C (Operations) as required.
(1) Scheme of Department of Defense Information Network Operations. Describe how Department of Defense
information network operations (including cybersecurity and communications security) support each phase of
the operation in the base plan or order
(2) Scheme of Network Transport and Information Services. Describe how network transport systems (satellite,
line of sight, radio, radio retransmission, cable, and wire) and information services support each phase of the
operation in the base plan or order.
(3) Scheme of Spectrum Management Operations. Describe how spectrum management and frequency
deconfliction support each phase of the operation in the base plan or order.
b. (U) Tasks to Subordinate Units. Further description of tasks nested in the base order. List signal support
tasks assigned to subordinate signal units not contained in the base order. Each task must include who (the
subordinate unit assigned the task), what (the task itself), when, where, and why (purpose). Include tasks for
supporting interagency, intergovernmental, and nongovernmental organizations. Use a separate subparagraph
for each unit. List units in task organization sequence. Place tasks that affect two or more units in paragraph
3c (Coordinating Instructions).
c. (U) Tasks to Staff. Include specific staff tasks, which must be completed in order to execute the mission. This
could include account validation or creation requirements, computer imaging tasks, nomination of guard and
taboo frequencies, mission command validation exercise requirements, or other key events officer requires
authentication and only the last name and rank of the commander appear in the signature block.
[page number]
[CLASSIFICATION]
Figure 2-1. Sample Annex H (Signal) format (continued)
[CLASSIFICATION]
ANNEX H (SIGNAL) TO OPERATION PLAN/ORDER [number] [(code name)]—[issuing
headquarters] [(classification of title)]
d. (U) Coordinating Instructions. List only instructions applicable to two or more subordinate units not
covered in the base plan or order such as timelines for communications exercises, command and control
validation exercises, and communications specific rehearsals.
4. (U) Sustainment. Identify priorities of sustainment for key signal support capabilities and specify additional
instructions as required in the paragraph below. Refer to Annex F (Sustainment) as required.
a. (U) Logistics. Use subparagraphs to identify priorities and specific instructions for signal logistics support
by phase and by communications site. Refer to Annex F (Sustainment) and Annex P (Host-Nation Support) as
required.
b. (U) Personnel. Define plan for rotating personnel through communications sites.
c. (U) Health Service Support. Refer to Annex F (Sustainment) as required.
d. (U) Financial Management. Refer to Annex F (Sustainment) as required.
e. (U) Maintenance Plan. Describe field service representative support plan, maintenance evacuation plan,
resourcing plan for non-mission capable items, locations of unit spares for critical communications systems,
scheduled network outages, and authorized service interruptions.
a. (U) Command.
(1) (U) Location of Key Signal Leaders. State the locations of the G-6 (S-6) and key signal unit commanders
and staff officers during each phase of the operation.
(2) (U) Succession of Technical Control. State the succession of technical control authority, if not covered in
the unit’s standard operating procedures.
(3) (U). Command Posts. Describe the employment of command posts (CPs), including the location of each CP
and its time of opening and closing, as appropriate. State the primary controlling CP for specific tasks or phases
of the operation (for example, “The division tactical command post will control the air assault”).
b. (U) Signal. Describe the concept of signal support, including location and movement of key signal nodes
and critical electromagnetic spectrum considerations throughout the operation. State the primary, alternate,
contingency, and emergency (PACE) communications plan. Refer to Annex H (Signal) as required.
ACKNOWLEDGE: Include only if attachment is distributed separately from the base order.
OFFICIAL:
[Authenticator’s name]
[Authenticator’s position]
Use only if the commander does not sign the original attachment. If the commander signs the original, no further
authentication is required. If the commander does not sign, the signature of the preparing staff officer requires
authentication and only the last name and rank of the commander appear in the signature block.
ATTACHMENTS: List lower-level attachment (appendixes, tabs, and exhibits). If a particular attachment is
not used, place “not used” beside the attachment number. Unit SOPs will dictate attachment development and
format. Common attachments include the following:
[page number]
[CLASSIFICATION]
Figure 2-1. Sample Annex H (Signal) format (continued)
[CLASSIFICATION]
ANNEX H (SIGNAL) TO OPERATION PLAN/ORDER [number] [(code name)]—[issuing
headquarters] [(classification of title)]
Appendix 1 – Concept of Signal Support Overlay.
Tab A – Retransmission Team Mission Checklist.
Appendix 2- Department of Defense Information Network Operations.
Tab A – Cybersecurity Incident Battle Drill.
Tab B – Cybersecurity Incident Report.
Tab C – Network Node Allocation and Organization.
Tab D – Network Outage Procedures and Report.
Tab E – Scheme of Network Monitoring.
Appendix 3 – Network Transport and Information Services.
Tab A – Line-of-Sight Analysis.
Tab B – High Frequency Radio Network Diagram.
Tab C – Voice, Video, Data Logical Network Diagrams.
Tab D – Voice over Internet Protocol Phonebook.
Tab E – Upper Tier Satellite Transmission Diagram.
Tab F – Coalition Forces Network Diagram and Foreign Disclosure Guidance.
Tab G – Satellite Access Authorizations and Gateway Access Authorizations.
Tab H – Retransmission Network Diagram.
Tab I – Mission Command Information Systems Allocation and Interconnections
(Battle Command Common Server/tactical server infrastructure configurations).
Tab J – Tactical Satellite Network Diagram.
Tab K – Digital Fires Diagram.
Appendix 4 – Spectrum Management Operations.
Tab A – Signal Operating Instructions and Frequency Allocation (Commo Card;
Tactical Radios).
Tab B – Signal Operating Instructions (Lightweight Directory Access Protocol Data
Interchange Format).
Tab C – Joint Restricted Frequency List.
Tab D – Joint Spectrum Interference Resolution Report Format and Procedures.
Tab E – Guarded Frequency List.
Appendix 5 – Communications Security.
Tab A – Communications Security Callout Message.
Tab B – Known Supersession Dates.
Tab C – Communications Security Compromise Procedures.
DISTRIBUTION: Show only if distributed separately from the base order or higher-level attachments.
[page number]
[CLASSIFICATION]
Figure 2-2. Sample Annex H, Appendix and Tabs
2-24. Units can modify these attachments to meet their specific needs, or create additional attachments as
necessary. See appendix A for example templates for the recommended appendixes and tabs to Annex H
(Signal).
This chapter discusses various planning processes and planning products. Section I
discusses network transport and information services, including satellite
communications transport, line-of-sight transport, tropospheric scatter, single-channel
radios, signal operating instructions, gateway access, and regional hub node
coordination. Section II discusses network planning, including cybersecurity, Internet
protocol planning, firewalls, quality of service, unified action partner interoperability,
and information dissemination management and content staging. Section III discusses
spectrum planning to include spectrum management operations. Section IV provides
information on planning cryptographic networks and communications security.
3-5. The satellite communications database is a consolidated repository of all validated military satellite
communications requirements. Planners must ensure a validated satellite database number associated with a
specific mission requirement is provided on a satellite access request. For more information on the satellite
communications database refer to CJCSI 6250.01F.
3-6. Satellite communications planning must take place as early as possible in the planning process to allow
sufficient time for the chain of command, regional satellite communications support center, and the Defense
Information Systems Agency to review and approve satellite access requests and gateway access requests.
3-13. Some WIN-T node types can support frequency division multiple access and time division multiple
access simultaneously. This requires planners to complete a full satellite access request for each modulation
type requested.
3-16. Registered ACAS planners adhere to and take action for conflicts related to mission requests. Conflicts
include missions that occur during authorized service interruptions, missions with overlapping time frames,
or a mission terminal with a validated overlapping time frame. Please see the reference page for the ACAS
website. Figure 3-1 provides icon examples of conflict flags. This graphic should be seen in color for
complete clarity.
Figure 3-1. Army Centralized Army Service Request System conflict flags
Network Engineer
3-21. The network engineer integrates the SMART-T into the unit’s portion of the DODIN-A. The network
engineer defines the requirements for the satellite access request and gateway access request, and determines
the optimal location to employ the SMART-T, based on threat environment, service and survivability
requirements.
3-22. The network engineer, in collaboration with the G3 or S3, provides the spectrum manager with
information regarding mission; deployment timeline; supporting headquarters requirements and services;
outside the continental United States or continental United States mission; host-nation agreements and
landing rights approval information; area of operations; and terrain in the area of operations.
Spectrum Manager
3-23. The spectrum manager uses the requirements provided by the network engineer to generate a satellite
access request and a gateway access request. The spectrum manager submits the satellite access request to
the regional satellite communications support center serving the deployed area of operations, and the gateway
access request to the Defense Information Systems Agency Contingency and Exercise Branch, using the Joint
Integrated Satellite Communications Tool over SIPRNET. When the unit receives an approved satellite
access authorization, the spectrum manager adds the frequencies to the spectrum database for deconfliction
with other known emitters.
LINE-OF-SIGHT TRANSPORT
3-30. Line-of-sight transport can handle much higher data rates than satellite communications systems, but
are range limited by the curvature of the Earth, terrain, and other natural or man-made obstructions. Line-of-
sight radio planning requires careful terrain analysis between proposed signal sites during site selection to
ensure the transmission path is unobstructed and to minimize the chances of an enemy intercepting or
jamming the signal.
TROPOSPHERIC SCATTER
3-35. Tropospheric scatter, or troposcatter, enables communications with microwave radio signals over
distances of nearly 200 miles by randomly scattering ultrahigh frequency and super high frequency radio
waves as they pass through the upper atmospheric layers of the troposphere. Troposcatter transmits radio
signals in a narrow beam aimed just above the horizon in the direction of the receiver station. As the signals
pass through the troposphere, some of the energy scatters back toward the receiver station.
RADIO RETRANSMISSION
3-40. Retransmission extends radio communications around obstructions and beyond line-of-sight range.
Retransmission assets support command and control, administrative and logistics, operations and
intelligence, and fires networks.
3-41. Retransmission operates on the command network to subordinates unless specifically tasked to operate
on another network. The primary radio monitors the command and operations, and intelligence networks.
The secondary radio provides the retransmission link.
3-42. SINCGARS operates as either a single-channel secure or a single-channel nonsecure retransmission
station. The retransmission radio automatically passes single-channel secure signals even if the
retransmission radios are operating in nonsecure mode. The retransmission operator cannot monitor the
communications unless the secure devices are filled and in the cipher mode.
3-43. Considerations for retransmission planning include—
Contingency planning.
Quick reaction force and relocation evacuation criteria.
Casualty evacuation plan.
Alternate locations.
Compromise procedures.
Reseed plan (vehicle, radios, and personnel).
3-44. Planners should also consider advanced coordination for establishing security plans, sleep plans,
logistics coordination for fuel, meals, maintenance repair, reporting requirements, and no fire areas.
3-45. Retransmission teams are vulnerable to enemy attack due to failure to control emissions using
electromagnetic masking and failure to use cover and concealment or camouflage. Radios placed on low
power offer the best emission control. Refer to ATP 6-02.53 and the Radio Operators Handbook for detailed
information about retransmission. Another resource for retransmission planning is the Graphic Training Aid
11-02-001, Retransmission Mission Checklist.
3-46. Retransmission normally requires the following equipment:
Two Advanced System Improvement Program radios.
AN/VRC-92 configuration.
CX-13298 retransmission cable.
Two OE-254 or COM-201B antennas.
3-47. Planners may configure retransmission networks as either the same network identification or different
network identification. Using different network identification provides a relay to extend communication
range and allows both radios to transmit and receive.
3-48. While planning radio retransmission, planners may consider using the same network identification.
This enables radio A to receive and transmit while radio B can either receive or transmit. Radio A and B
frequency must have 10 megahertz or greater frequency separation. See figure 3-2.
LINK-16
3-53. Link-16 is an encrypted, jam-resistant tactical data link network used by U.S. and North Atlantic Treaty
Organization allies to create situational awareness among dispersed battle elements by sharing information
over a common communications link. This enables command and control centers to create a common
operational picture, which allows friendly forces to visualize the battlespace, identify threats, and acquire
targets.
3-54. Link-16 communications transfer real-time combat data, voice communications, imagery, and relative
navigation information on the battlefield. This network uses joint tactical information distribution system-
compatible communications terminals to transmit and receive data messages. Link-16 network messages
broadcast simultaneously to as many users as needed. Link-16 is a nodeless network that does not depend on
any single terminal to act as a node. Link-16-capable terminals act as nodes.
3-55. The primary application of Link-16 is air and missile defense command and control systems. Various
countries use the Link-16 network for national air defense, to link their sea- and land-based vessels, ground-
based sensors, and surface-to-air missile systems.
INFORMATION SERVICES
3-56. Information services allow authorized access, storage, and sharing of information among mission
partners, as well as dynamically tailoring and prioritizing information to support the mission and affect the
operational environment (FM 6-02). Tactical signal systems deliver classified and non-classified voice,
video, and data services—including Defense Information Systems Network Services—needed to enable
situational understanding, staff planning, and coordination. Information services consist of—
Messaging services enable the exchange of information among users. Messaging services include
e-mail, Organizational Messaging Service, instant messaging, and alerts.
Discovery services enable discovery of information content or services stored in directories,
registries, and catalogs. An example of a discovery service is a search engine.
Mediation services enable system interoperability by processing data to translate, aggregate, fuse,
or integrate it with other data.
Collaboration services provide the ability for warfighters to work together and share capabilities.
Examples of collaboration services are chat, online meetings, and workgroup applications.
Storage services provide physical and virtual data hosting. Storage services include archiving,
continuity of operations, and content staging. Standard operating procedures or operation orders
should define information storage locations.
User assistance services provide centralized service desk assistance and automated access to
lessons and best practices, which may improve processes or reduce the effort required to perform
tasks.
Identity and access management (Enterprise Directory Service) provides authoritative enterprise
identity and contact attributes for combatant commands, Services, and agencies. Enterprise
Directory Service includes—
DOD Enterprise White Pages—authoritative identity and contact information for all DOD
common access card holders.
Global Directory Service—a distribution point for personal public key certificates, certificate
revocation lists, and certificate authority certificates.
SECTION II – NETWORKING
3-62. Networking encompasses several components to ensure availability. Army network planners should
consider cybersecurity, internet protocol planning, allocation, and quality of service. Early planning is key to
successful network planning.
CYBERSECURITY
3-63. Cybersecurity is prevention of damage to, protection of, and restoration of computers, electronic
communications systems, electronic communications services, wire communication, and electronic
communication, including information contained therein, to ensure its availability, integrity, authentication,
confidentiality, and nonrepudiation (DODI 8500.01).
3-64. Cybersecurity sets the baseline security posture of the network to protect against known exploits and
vulnerabilities, rather than a particular threat actor or capability. Cybersecurity ensures information
technology assets provide mission owners and operators confidence in the confidentiality, integrity, and
availability of information systems and information, and their ability to make choices based on that
confidence. The DOD cybersecurity framework provides the foundation for the cybersecurity program. Refer
to ATP 6-02.71 for detailed information about the cybersecurity framework.
SECURITY DOMAIN
3-65. A security domain is a system or network, such as NIPRNET, SIPRNET, or Joint Worldwide
Intelligence Communications System, that operates at a particular sensitivity level. Transferring data between
security domains, for example between NIPRNET and SIPRNET, requires a cross domain solution. A cross
domain solution is a form of controlled interface that provides the ability to manually and/or automatically
access and/or transfer information between different security domains (CNSSI 4009). Cross domain solutions
need careful control because of the damage that can result due to spillage from a higher domain to a lower
classification, for example secret information spilled onto NIPRNET.
ALLOCATION BY APPLICATION
3-70. Certain applications and data types, such as voice and video, require low latency to operate correctly.
On the other hand, data transmission can tolerate multi-second delays. Network planners should implement
routing based on the application and type of data. One way to perform this is to allot a portion of the overall
address space to treat voice with higher priority queuing, while separating this from the data space. Other
protocol-specific applications may need further address delineation.
3-73. DHCP also enables efficient use of IP addresses by allowing an IP address to be reused among devices
within dynamically allocated address pools. An IP address may be used by one device one day and a different
device the next. DHCP supports three types of IP address allocation—
Automatic allocation—the DHCP server assigns a permanent IP address to the client.
Manual allocation—the DHCP server assigns a fixed IP address, based on the device’s hardware
address.
Dynamic allocation—the DHCP server assigns an IP address for a limited time, after which the
address can be reassigned.
3-74. Automatic allocation may be useful for a particular set of users or devices requiring a permanent IP
address assignment using DHCP, where there is no requirement for devices to have a specific IP address.
Planners should consider reserving a set of permanent addresses with no associated DHCP address.
3-75. Manual allocation requires the administrator to associate a particular hardware address with a
corresponding IP address. Typically, the administrator bases manual DHCP on a predefined mapping scheme.
3-76. Dynamic allocation configures address pools in DHCP servers to reuse IP addresses. The DHCP server
leases its IP addresses to clients for a fixed period and assigns an IP address to a particular client for a given
time period.
FIREWALLS
3-77. A firewall is a network security device that monitors incoming and outgoing network traffic and grants
access to the network based on approved local policies. Network firewalls provide network security against
threats and ensure a resilient network.
3-78. G-6 and S-6 personnel assigned to the DODIN operations section normally configure firewalls based
on defined guidelines. Firewalls protect networks from unauthorized intrusions that may harm the network.
Considerations for planning firewalls include the following–
Identify security requirements for your organization.
Define an overall security policy.
Define a firewall philosophy.
Identify permitted communications.
Identify the firewall enforcement points.
QUALITY OF SERVICE
3-79. When available network bandwidth is relatively fixed, it is important to allocate it effectively. WIN-T
handles several different types of data with varying importance and transmission requirements. For example,
in an IP network, voice and video become digital packets during transmission similar to e-mail. Delays in
voice or video packets during transport are not acceptable. Video can become choppy and not viewable, and
voice calls can become garbled. On the other hand, packets comprising an e-mail eventually arrive intact
with no recognizable consequence of time delays.
3-80. Some sources of data are more time-critical than other sources. Quality of service is a networking
approach that helps optimize available bandwidth. It gauges user demand to maintain effective throughput.
Quality of service edge devices provides the means to manage bandwidth-constrained traffic, taking into
account both time criticality and information importance. Quality of service mechanisms help manage
resources to avoid network bottlenecks, and ensure that both quality and speed of service meet user
requirements.
the right time, in a usable format. Content staging compiles, catalogs, and caches information. The Army
task of information dissemination management and content staging corresponds to, and nests within, the joint
task of DODIN content management. Information dissemination management and content staging (DODIN
content management) allow users to retrieve, cache, compile, catalog, and distribute information to support
planning and decision making. Information dissemination management and content staging consist of the
technologies, techniques, processes, policies, and procedures to provide—
Awareness of relevant, accurate information.
Automated access to newly revealed or recurring information.
Timely, efficient, delivery of information in a usable format.
The DODIN operations essential tasks take place at the strategic, operational, and tactical levels
and support all warfighting and business functions. DODIN operations enable network and system
availability, information protection, and timely information delivery across strategic, operational,
and tactical boundaries.
NETWORK HARDENING
3-82. Network hardening ensures the confidentiality, integrity, and availability of network services. A
hardened network mitigates enemy entry into the DODIN-A. Commanders and staffs ensure their network is
secure and accessible to all approved and validated users.
3-83. Network planners should consider implementation of a zero trust architecture. Zero trust provides a
collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-
request access decisions in information systems and services in the face of a network viewed as compromised.
Zero trust architecture is an enterprise’s cybersecurity plan that uses zero trust concepts and encompasses
component relationships, workflow planning, and access policies. National Institute of Standards and
Technology Special Publication 800-207 provides detailed implementation guidance for zero trust
architecture.
Strong Authentication
3-84. Reducing anonymity as well as enforcing authenticity and accountability for actions on the DODIN-A
improves the security posture of the network. The connection between weak authentication and account
seizure is well known and established. Strong authentication helps prevent unauthorized access, including
wide-scale network compromise by impersonating privileged administrators. Commanders and supervisors
focus on protecting high-value assets, such as servers and routers, and privileged system administrator access.
Device Hardening
3-85. Proper hardening of network devices increases the cost and complexity of adversary exploitation.
Network managers prevent common exploitation techniques through proper configuration, vulnerability
patching, and disabling active content in e-mails. Planners should ensure updated device patching prior to
entering an area of operations. A defense in depth approach places layers of defensive measures to slow down
or stop the adversary from entering the network. These measures are critical to thwarting an adversary’s
attempts to escalate privileges and maneuver freely within DOD networks.
3-86. Device vulnerabilities are exploitable weaknesses in software or hardware that provide an adversary
an opportunity to compromise the confidentiality, integrity, and availability of an information system.
Adversaries attempt to exploit vulnerabilities for various purposes, including accessing, modifying, deleting
or exfiltrating sensitive information, modifying system configurations, installing malicious code, or denying
system access to authorized users.
authentication services. If adversaries gain access to systems within a DOD demilitarized zone, they must be
prevented from exploiting active directory trust relationships to gain elevated privileges inside the DODIN.
This requires the proper management of trust relationships between DOD enclaves. Commanders and
supervisors must ensure only authorized devices can access DOD infrastructure, either physically or
logically.
3-88. Hardening the DODIN-A from threats increases network reliability. Network planners configure
devices and peripheral equipment to ensure the network is secure and available for users. Planners enable
and configure network traffic monitoring and endpoint security to detect and prevent threats to the DODIN-
A. Table 3-1 on page 3-15 contains suggested network hardening techniques.
Legend:
ESM Endpoint Security Manager
GPOS group policy objects
RCC regional cyber center
3-90. Spectrum management operations aim to ensure access to the electromagnetic spectrum in support of
the Army's operational missions. Spectrum management operations enable cyberspace electromagnetic
activities. Spectrum management is the operational, engineering, and administrative procedures to plan,
coordinate, and manage use of the electromagnetic spectrum and enables cyberspace, signal and EW
operations.
3-91. Spectrum management operations enable the management of allotted and limited frequencies directly
supporting operational forces throughout the world. The Army is dependent upon the use of the
electromagnetic spectrum at all echelons. Effective spectrum management operations enable electromagnetic
systems to perform their functions in the intended environment without causing electromagnetic interference.
3-92. Spectrum planning includes the identification of spectrum requirements for training, pre-deployment,
deployment, and reconstitution of Army forces, both within and outside the continental United States.
Spectrum planning is a continual process that must be deliberate as well as dynamic. It requires the collection,
storage, and protection of critical spectrum data, and assured access to this data by spectrum planners on a
global scale. Additionally, planning for the establishment of communications and coordinating for spectrum
use with national and international governmental and non-governmental entities is critical to spectrum
planning.
3-93. Spectrum managers use various tools to manage and plan the unit’s spectrum needs and objectives.
Examples include—
Automated Communications Engineering Software and Joint Automated Communications
System.
Afloat Electromagnetic Spectrum Operations Program.
Electronic Warfare Planning Management Tool.
Host-Nation Spectrum Worldwide Database Online.
Joint Automated Communications-Electronics Operation Instructions System.
Spectrum Situational Awareness System.
Systems Planning, Engineering, and Evaluation Device.
Coalition Joint Spectrum Management Planning Tool.
FREQUENCY DECONFLICTION
3-94. Frequency deconfliction is a systematic management procedure to coordinate the use of the
electromagnetic spectrum for operations, communications, and intelligence functions (JP 3-85). Frequency
deconfliction is one element of electromagnetic spectrum management and applies practices to minimize or
prevent spectrum-dependent devices from suffering or causing interference while being used as intended
(ATP 6-02.70). Frequency deconfliction shares a common goal with electromagnetic interference mitigation.
Spectrum managers conduct frequency deconfliction during the planning phase of a mission to prevent
interference. Electromagnetic interference mitigation takes place when interference occurs during mission
execution.
3-95. The G-6 or S-6 spectrum manager develops and maintains a database of all known emitters and
receivers in the area of operations. This database identifies and prioritizes competing systems for frequency
assignments. Spectrum managers review the database to deconflict frequencies and prevent interference.
3-96. Deconfliction ensures EW capabilities do not create unintended electromagnetic interference
(frequency fratricide) with friendly communications, unmanned aircraft systems, weapon systems, or
positioning, navigation, and timing. Failing to share situational understanding could cause planners or
operations personnel to miss cyberspace or electromagnetic attack indicators. Spectrum managers use various
tools to deconflict frequencies. Refer to ATP 6-02.70 for a list of tools available to spectrum managers for
frequency deconfliction.
FREQUENCY ASSIGNMENT
3-97. The spectrum manager receives spectrum resources in the form of allocation tables and permissions
from higher echelons, such as the Army Spectrum Management Office, Joint Frequency Management Office,
or host-nation spectrum authorities. The spectrum manager uses management tools to transfer the information
into the standard frequency action format or standard spectrum resource format and enters it into spectrum
use databases.
RADIO LOADSETS
3-100. G-6 or S-6 planners identify requirements for the construction of loadsets to support their
organization’s radio networks. The frequency manager constructs loadsets using ACES, saves them to file,
and distributes them to subordinate units or elements for follow-on distribution to radio users. Loadsets
provide radio network access and monitoring based on the user. A loadset consists of communications
security (COMSEC) key tags, frequency hopsets, lockouts, and target definition, transmission security key
and net identifiers.
3-101. For example, the commander of an infantry battalion is normally a member of several single-channel
radio networks. One of the commander’s radios could be preset to operate in all of the following networks:
Brigade command network.
Brigade operations network.
Battalion command network.
Battalion operations network.
Brigade retransmission network.
LOADSET UPDATES
3-102. Signal planners use ACES to manage loadset data. The loadset data is saved to a file, and distributed
using a fill device to ensure they are in-place and available for loading into the SINCGARS at the appropriate
key changeover time. Signal sections should have several loadsets with associated key constructed and
distributed (or available for distribution) for immediate use.
3-103. Existing loadsets may require revision when the required network content changes (unit
reassignment or attachment). New loadsets may require construction to meet new requirements (for example,
create a new task force organization).
HOST-NATION COORDINATION
3-105. Host-nation coordination is negotiation for authorization to operate radio frequency-emitting
equipment within a sovereign nation. This coordination is necessary to conform to international and national
laws, and to avoid interfering with host-nation communications and emergency services. Coordination
prevents diplomatic friction with the host-nation (FM 6-02).
3-106. Host-nation coordination ensures initial spectrum availability and supportability for operations.
Channels for coordinating spectrum allocation at the national and international levels adhere to policies
established in the planning process. Spectrum managers coordinate with host-nation and adjacent countries’
spectrum authorities, particularly if forces stage, train, or operate in adjacent countries. Coordination covers
airspace, sovereign waters, and satellite communications frequencies. Coordination includes advance
planning and continual collaboration during operations. Host-nation coordination does not apply to forcible
entry operations or operations in a hostile nation. Refer to ATP 6-02.70 for detailed information about
spectrum management operations.
and pass this information to the ACES operator. When the plan is complete with the short titles, the key
management infrastructure operating account manager returns the cryptographic plan to the ACES operator.
3-114. The ACES operator finishes processing the cryptographic network, and provides the cryptographic
network plan along with the signal operating instructions and loadset data to end users. The key management
infrastructure operating account manager generates and distributes red key to the end user by loading keys
into the user’s fill device. End users key the end cryptographic units from the fill device.
This chapter discusses signal site planning. Section I discusses signal site analysis and
site selection. Section II discusses site setup, including site reconnaissance, priorities
of work, site security and defense, and command post signature reduction.
4-3. Signal planners consider the operating characteristics, limitations, and effective planning distance for
each available communications asset. Signal planners evaluate the terrain (including man-made features) in
the operational area to visualize how they can support the mission. Planners can take advantage of terrain
and structures for terrain masking to protect systems from enemy detection, but the same features can make
some communications systems, such as line of sight radios, ineffective. Planners consider the current threat
estimate to prevent placing communications sites near known or anticipated enemy positions.
4-4. As planners define communications requirements, the number of retransmission sites needed to cover
the area of operations may help determine the supportability of proposed courses of action during the military
decision-making process.
LINK GEOMETRY
4-5. The G-6 or S-6 analyzes the terrain to determine how to make the geometry of the operations work in
favor of friendly forces. Improper link geometry makes it easier for the enemy to use direction finding and
jamming capabilities.
4-6. When possible, terrestrial line of sight communications links should parallel the forward line of own
troops. This keeps the primary signal strength of U.S. transmissions in friendly terrain. Deploying units and
communications systems with the transmission path perpendicular to the forward line of own troops aims
transmissions toward the enemy and makes it easier for the enemy to jam or intercept communications.
TERRAIN MASKING
4-7. When possible, command post locations should place terrain features and manmade structures between
friendly communications systems and enemy positions. This may require moving senior headquarters farther
forward and using more tactical command posts to ensure commanders can continue to direct their units
effectively.
ANTENNA PLACEMENT
4-8. Command post locations generally determine antenna locations. The proper installation and
positioning of antennas around command posts are critical. G-6 or S-6 planners and system operators should
position antennas and radio frequency emitters as far as practical from the command post to spread out the
electromagnetic signature.
SITE SELECTION
4-9. Selecting the right location for a command post is critical to its survivability. Poor placement can result
in limited flexibility, limited mobility, enemy detection, degraded survivability, and reduced effectiveness.
Site selection considers the mission variables METT-TC. Based on the signal site analysis, the G-6 or S-6
recommends a signal site for each proposed course of action during the military decision-making process.
The final site selected must be—
Able to support the selected course of action.
Logistically supportable.
Defensible—
Defensive plan.
Escape routes.
Cover.
Concealment.
4-10. Operating against a peer threat may require locating signal sites away from the supported command
posts. This way, if an enemy locates and destroys communications systems, they do not destroy the entire
command post capability. When placing signal systems away from the supported command post, planners
must consider additional physical security and site defense requirements.
SITE RECONNAISSANCE
4-17. Before occupying a signal site, leaders should reconnoiter the designated area. The site reconnaissance
might find unanticipated conditions that make the selected site unacceptable. This would require adjusting
the operation plan or order to select a new signal site. The reconnaissance team should consist of the company
leader, the transmission supervisor (if applicable), node supervisor (if applicable), and a security team. The
makeup of the reconnaissance team depends on the type of unit. The reconnaissance team maintains single-
channel radio communications with their parent headquarters. The reconnaissance team should—
Ensure the selected site can support the unit’s communications requirements.
Ensure the site is large enough to accommodate and tactically disperse all communications
assemblages on the site.
Determine whether the selected site is securable and defensible. The reconnaissance team
considers—
The size of the site.
The number of personnel available to defend the site.
Entrances and avenues of approach.
Concealment from major roads or other vantage points. This may involve traveling around
the entire site from a distance to visualize what the enemy would see.
The reconnaissance team should verify the site is close enough to the supported unit command
post to connect with the signal systems. Increasing distance between signal assemblages and
subscribers complicates troubleshooting.
The reconnaissance team should verify line of sight between stations for multichannel radio links.
Line of sight planning range is about 25 miles (40 kilometers).
The reconnaissance team should ensure terrain and man-made structures will not interfere with
communications equipment and links.
4-18. If the situation does not allow for a leader’s reconnaissance, leaders use the available information
system resources such as line of sight analysis tools and satellite imagery to evaluate the proposed site.
Considerations for selecting a command post location include—
Establishing site security and defense.
Communicating with higher, subordinate, and adjacent headquarters.
Determining the range of enemy weapon systems.
Gaining accessibility to passable entry and departure points (even in poor weather).
Using terrain for passive security (cover and concealment) and terrain masking.
Avoiding prominent terrain features (hilltops and crossroads).
Co-locating with tactical units for mutual support and local security.
Exercising command and control over subordinate and supporting units.
PRIORITIES OF WORK
4-19. Standard operating procedures generally dictate unit priorities of work. However, the commander may
change the priorities of work based on the mission variables METT-TC. If there are not enough Soldiers
available to perform all of the tasks associated with setting up a command post and site security, established
priorities help leaders determine the most important tasks to accomplish first. Clear priorities of work ensure
personnel complete the key tasks to establish and secure the command post. Signal leaders continuously
supervise the setup of communications systems to ensure crews follow the priorities of work.
LINK ESTABLISHMENT
4-23. The G-6 or S-6 determines and documents link establishment priorities for the network. These
priorities ensure signal teams establish the most critical network capabilities to support the commander’s
intent and the main effort first. Priorities of work should always support the next higher echelon. That is, an
individual team’s priorities support the section or platoon. The platoon’s priorities support the company. The
G-6 or S-6 priorities must support the G-3 or S-3 and the commander’s priorities. Figure 4-1 on page 4-5
shows a sample of link establishment priorities.
CO-LOCATED SITES
4-25. Larger signal elements, up to platoon size, usually co-locate with their supported command post. The
signal personnel assist in perimeter defense. The supported unit headquarters conducts the overall defense of
the command post. The signal element coordinates closely with the supported unit.
REMOTE SITES
4-26. Planners must coordinate for security and sustainment when deploying signal sites remotely from the
supported unit. When a signal site does not co-locate with the supported headquarters, the signal element
conducts site defense. They must be prepared to survive enemy air, artillery, and chemical, biological,
radiological, and nuclear attack with little outside assistance. Because of their size and limited defensive
capabilities, signal elements need assistance from the supported unit to defend against a large-scale assault.
SMALL TEAMS
4-27. Small teams often operate from isolated positions, usually for retransmission. Teams should try to
remain concealed and report enemy activity to higher headquarters. The teams conduct risk assessments at
remote sites to determine the likelihood of mission success. Supported unit leaders must carefully track
threats and move teams quickly when in danger.
SIGNATURE REDUCTION
4-28. Since World War II, the size and complexity of command posts have increased dramatically. Command
post signatures have correspondingly increased with the number and types of vehicles and communications
systems employed. All of these signatures increase an enemy’s likelihood of successfully detecting and
targeting critical command and control nodes.
VISUAL
4-29. Command posts require camouflage and concealment to survive on the battlefield. Camouflage and
concealment improve operations security and increase survivability by minimizing the observable size of
command posts.
Light Discipline
4-32. Excessive light makes tactical sites easy to locate at night. Signal site plans must actively seek to
implement light discipline to minimize the chances of detection. During site setup, Soldiers should cover or
blacken any reflective surfaces, such as bare metal surfaces or vehicle windshields. Minimize the use of
flashlights or other electrical lights to prevent visual detection. Lit cigarettes and cigars are visible from great
distances at night.
4-33. If Soldiers need more illumination than an image intensifier can provide in infrared mode during
movement, they should use additional infrared light sources. The combination should provide the light
needed with the least risk of enemy detection. When using infrared light, leaders must consider the enemy’s
night vision and infrared capabilities. For instance, an enemy with night vision capability can sense infrared
light signals, and concentrate direct and indirect fire on a platoon using infrared light.
ELECTROMAGNETIC
4-34. Emission control is the selective and controlled use of electromagnetic, acoustic, or other emitters to
optimize command and control capabilities while minimizing, for operations security: a. detection by enemy
sensors, b. mutual interference among friendly systems, and/or c. enemy interference with the ability to
execute a military deception plan (JP 3-85).
4-35. Commanders should consult with intelligence G-2 or S-2 and EW personnel to identify threat EW
capabilities and intent to collect intelligence through the electromagnetic spectrum. Additionally, EW
professionals must evaluate the effectiveness of friendly force emission control and recommend
modifications or improvements. This process should take place before mission execution. Units should
implement and exercise emission control plans before execution and conduct vulnerability analysis and
assessments of friendly communications assets to understand the electromagnetic environment.
4-36. Employing aspects of emission control will help prevent enemy EW assets from discovering and
attacking friendly locations. Electromagnetic protection is only effective when everyone in an organization
understands its importance and can readily identify opportunities to implement protection activities
(ATP 3-12.3).
4-37. Radio discipline is the most basic and effective emission control technique to protect against enemy
EW. Radio discipline can take the form of limiting transmissions, antenna masking, and the use of low power.
Additional techniques for emission control include—
Preplan messages before transmitting. The radio operator should know what to say before
beginning a transmission. Write out the message before beginning the transmission. This
minimizes the number of pauses in the transmission and decreases transmission time. It also
ensures the conciseness of the message.
Transmit quickly and precisely. This is critical when the quality of communications is poor.
This reduces the need to repeat a radio transmission. Unnecessary repetition increases transmission
time and the enemy’s opportunity to intercept U.S. transmissions and gain valuable information.
When a transmission is necessary, the radio operator should speak in a clear, well-modulated
voice, and use proper radiotelephone procedures.
Use equipment capable of data burst transmission. This is one of the most significant
advantages of tactical satellite communications systems. Soldiers use limited time for encoded
messages on a digital entry device for transmission over satellite systems.
Use an alternate means of communication. Soldiers use alternate means of communications,
such as cable, wire, or messages to convey necessary directives and information.
Use brevity codes. A brevity code is a code that provides no security, but which has as its sole
purpose the shortening of messages rather than the concealment of their content. (Refer to ATP 1-
02.1 for more information on brevity codes.)
4-38. When evaluating command post electromagnetic signatures, planners should consider concentrations
of vehicles. Parking vehicles and aircraft away from command posts mitigates the concentrated
electromagnetic signature. Planners should also consider installing antennas away from the command post to
enhance signature reduction. Operating antenna systems away from a command post requires planning for
site security and defense.
4-39. G-6 or S-6 planners should collaborate with the cyber electromagnetic warfare officer during signal
site planning and consider using electromagnetic masking and electromagnetic decoys to protect the locations
of critical nodes. Electromagnetic masking is the controlled radiation of electromagnetic energy on friendly
frequencies in a manner to protect the emissions of friendly communications and electronic systems against
enemy electromagnetic support measures/signals intelligence without significantly degrading the operation
of friendly systems (JP 3-85). Electromagnetic decoys used for masking radiate at higher energy levels than
normal communications to hide real transmissions from enemy electromagnetic warfare support and signals
intelligence capabilities. Refer to ATP 3-12.3 for more information about electromagnetic masking.
4-40. A large number of antennas, electromagnetic emissions, and support towers are common in major
command posts. If tactically feasible, units should use remote antennas to reduce the vulnerability of the
command post to collateral damage if an enemy destroys the communications system. Radar reflective
camouflage netting can help mask electromagnetic signature from the back and sides of directional antennas.
NOISE
4-41. Noise discipline contributes to command post survivability. During site setup, soldiers should secure
loose metal parts of signal assemblages to prevent them from making noise in the wind. The power generation
equipment associated with signal equipment can generate significant noise. During site selection, signal
leaders should consider measures to mask and diffuse the noise from electrical generators and environmental
control equipment. Once the signal site is set up, leaders should restrict unnecessary vehicle and foot
movement. Soldiers should limit outdoor talk and minimize radio use. When radio use is necessary, operators
should turn the speaker volume to the lowest setting they can hear.
RADAR
4-42. Radio frequency reflective camouflage netting can help reduce the radar signature of command posts.
Barbed wire exhibits a measurable radar cross section at radar frequencies. When possible, Soldiers should
emplace barbed wire and concertina wire to follow natural terrain features to reduce their radar signature.
INFRARED
4-43. Power generators and other heat sources produce thermal signatures that enemy surveillance and target
acquisition sensors can detect. Emplacing heat-producing equipment and other thermal sources in defilade
positions, within structures, or under natural cover mitigates their infrared signatures. Heat diffusers that
disperse and vent vehicle exhaust away from the threat sensors are expedient means of thermal signature
reduction.
Commanders and staffs use annex H (Signal) to describe how signal supports the
concept of operations described in the base plan or order. The G-6 or S-6 develops
annex H (Signal) using the five-paragraph attachment format from FM 6-0. This
appendix provides templates for suggested appendixes and tabs to Annex H (Signal)
of an operation plan or order.
A-10. The network node allocation and organization tab provides a graphic depiction of the elements’
network assets. See figure A-1 below. This graphic should be seen in color for complete clarity.
Figure A-2. Example Tab C to Appendix 3–Voice, video, and data logical network diagram
Figure A-3. Sample Tab E to Appendix 3–Upper tier satellite transmission diagram
Figure A-5. Sample Tab I–Mission command information systems allocation and
interconnections
Legend
bps bytes per second SMART-T secure, mobile, anti-jam, reliable tactical-
terminal
GHz gigahertz mw milliwatt
Kbs kilobytes per second MHz megahertz
SINCGARS single-channel ground and w watt
airborne radio system
This appendix displays sample cut sheet formats and brief descriptions for various
tactical signal assemblages. The purpose of this appendix is to aid planners in the
execution of DODIN-A planning. The Cyber Lessons Learned website contains a large
repository of signal, cyberspace and EW information.
Error Count Disabled Unless in Test Mode Disabled Unless in Test Mode
Legend:
DCE data circuit terminating equipment
DTE data terminal equipment
EIA electronic industries alliance
NRZ non-return zero
POINT OF PRESENCE
B-6. A point of presence provides access to Defense Information Systems Network services for selected
users at the battalion, brigade, and division. The point of presence supports high-throughput line of sight and
satellite communications network transport. The point of presence is general-purpose user operated; it does
not require dedicated manning by signal Soldiers. It operates either at-the-halt or on-the-move, but is mainly
used on-the-move. The point of presence is mountable in a variety of command vehicles. The point of
presence provides data and voice network access for reach between brigade combat teams, and reachback
communications to the division.
B-7. When operating at-the-halt, the point of presence can provide access for wired IP data terminals or
SIPRNET voice over internet protocol phones. When operating on-the-move, it provides the same
capabilities to users on-board the vehicle. Network planners configure point of presence components before
deployment. The network management subsystem can dynamically update subsequent configurations over-
the-air. Table B-5 provides a sample point of presence cut sheet.
PHOENIX TERMINAL
B-9. Phoenix ground satellite terminals enable expeditionary signal battalions to provide large division and
corps headquarters with high-bandwidth network communications and high capacity, inter- and intra-theater
range extension for networked command and control information. Planners use the Phoenix terminal for high-
throughput missions, which include unmanned air system feeds, video teleconferencing, and large numbers
of subscribers and computers on the network. Table B-7 provides a sample of a Phoenix cut sheet.
The glossary lists acronyms and terms with Army or joint definitions. Where Army and
joint definitions differ, (Army) precedes the definition. ATP 6-02.12 is not the
proponent for any Army terms. The proponent publication for terms is listed in
parentheses after the definition.
SECTION II – TERMS
adversary
A party acknowledged as potentially hostile to a friendly party and against which the use of force may
be envisaged. (JP 3-0)
area of operations
An operational area defined by the joint force commander for land and maritime forces that should be
large enough to accomplish their missions and protect their forces. (JP 3-0)
assumption
A specific supposition of the operational environment that is assumed to be true, in the absence of
positive proof, essential for the continuation of planning. (JP 5-0)
communications security
The protection resulting from all measures designed to deny unauthorized persons information of value
that might be derived from the possession and study of telecommunications, or to mislead
unauthorized persons in their interpretation of the results of such possession and study. Also called
COMSEC. (JP 6-0)
cross domain solution
A cross domain solution is a form of controlled interface that provides the ability to manually and/or
automatically access and/or transfer information between different security domains. (CNSSI 4009)
cybersecurity
Prevention of damage to, protection of, and restoration of computers, electronic communications
systems, electronic communications services, wire communication, and electronic communication,
including information contained therein, to ensure its availability, integrity, authentication,
confidentiality, and nonrepudiation. (DODI 8500.01)
cyberspace
A global domain within the information environment consisting of the interdependent networks of
information technology infrastructures and resident data, including the Internet, telecommunications
networks, computer systems, and embedded processors and controllers. (JP 3-12)
Department of Defense information network
The set of information capabilities, and associated processes for collecting, processing, storing,
disseminating, and managing information on demand to warfighters, policy makers, and support
personnel, whether interconnected or stand-alone. Also called DODIN. (JP 6-0)
Department of Defense information network-Army
An Army-operated enclave of the Department of Defense information network that encompasses all
Army information capabilities that collect, process, store, display, disseminate, and protect information
worldwide. Also called DODIN-A. (ATP 6-02.71)
electromagnetic masking
The controlled radiation of electromagnetic energy on friendly frequencies in a manner to protect the
emissions of friendly communications and electronic systems against enemy electromagnetic support
measures/signals intelligence without significantly degrading the operation of friendly systems. (JP 3-
85)
emission control
The selective and controlled use of electromagnetic, acoustic, or other emitters to optimize command
and control capabilities while minimizing, for operations security: a. detection by enemy sensors, b.
mutual interference among friendly systems, and/or c. enemy interference with the ability to execute a
military deception plan. Also called EMCON. See also electromagnetic warfare. (JP 3-85)
enemy
A party identified as hostile against which the use of force is authorized. (ADP 3-0)
frequency deconfliction
A systematic management procedure to coordinate the use of the electromagnetic spectrum for
operations, communications, and intelligence functions. See also electromagnetic spectrum
management; electromagnetic warfare. (JP 3-85)
hybrid threat
The diverse and dynamic combination of regular forces, irregular forces, terrorists, or criminal
elements unified to achieve mutually benefitting effects. (ADP 3-0)
insider threat
A person with placement and access who intentionally causes loss or degradation of resources or
capabilities or compromises the ability of an organization to accomplish its mission through espionage,
providing support to international terrorism, or the unauthorized release or disclosure of information
about the plans and intentions of U.S. military forces. (AR 381-12)
line of sight
The unobstructed path from a Soldier’s weapon, weapon sight, electronic sending and receiving
antennas, or piece of reconnaissance equipment from one point to another. (ATP 2-01.3)
military decision-making process
An iterative planning methodology to understand the situation and mission, develop a course of action,
and produce an operation plan or order. (ADP 5-0)
network transport
The processes, equipment, and transmission media that provide connectivity and move data between
networking devices and facilities. (FM 6-02)
operational environment
A composite of the conditions, circumstances, and influences that affect the employment of
capabilities and bear on the decisions of the commander. Also called OE. (JP 3-0)
planning
The art and science of understanding a situation, envisioning a desired future, and determining
effective ways to bring that future about. (ADP 5-0)
running estimate
The continuous assessment of the current situation used to determine if the current operation is
proceeding according to the commander’s intent and if planned future operations are supportable.
(ADP 5-0)
spectrum management operations
The interrelated functions of spectrum management, frequency assignment, host nation coordination,
and policy that together enable the planning, management, and execution of operations within the
electromagnetic operational environment during all phases of military operations. (FM 6-0)
synchronization
1. The arrangement of military actions in time, space, and purpose to produce maximum relative
combat power at a decisive place and time. 2. In the intelligence context, application of intelligence
sources and methods in concert with the operation plan to answer intelligence requirements in time to
influence the decisions they support. (JP 2-0)
threat
Any combination of actors, entities, or forces that have the capability and intent to harm United States
forces, United States national interests, or the homeland. (ADP 3-0)
REQUIRED PUBLICATIONS
These documents must be available to intended users of this publication.
DOD Dictionary of Military and Associated Terms. August 2021.
FM 1-02.1. Operational Terms. 9 March 2021.
FM 1-02.2. Military Symbols. 11 November 2020.
RELATED PUBLICATIONS
These documents contain relevant supplemental information.
JOINT PUBLICATIONS
Most joint publications are available online: https://www.jcs.mil/doctrine.
JP 2-0. Joint Intelligence. 22 October 2013.
JP 3-0. Joint Operations. 17 January 2017, Incorporating Change 1, 22 October 2018.
JP 5-0, Joint Planning, 1 December 2020.
JP 3-12. Cyberspace Operations. 8 June 2018.
JP 3-85. Joint Electromagnetic Spectrum Operations. 22 May 2020.
JP 6-0. Joint Communications System. 10 June 2015, Incorporating Change 1, 04 October 2019.
ARMY PUBLICATIONS
Most Army doctrinal publications are available online: https://armypubs.army.mil.
ADP 3-0. Operations. 31 July 2019.
ADP 3-90. Offense and Defense. 31 July 2019.
ADP 5-0. The Operations Process. 31 July 2019.
ADP 6-22. Army Leadership and the Profession. 31 July 2019.
AR 380-10. Foreign Disclosure and Contacts with Foreign Representatives. 14 July 2015.
OTHER PUBLICATIONS
American, British, Canadian, Australian, New Zealand Armies Program Standards Number 2100
Edition 4, and Coalition Wide-Area Network, Network Operations, and Planning can be
found at https://wss.apan.org/cda/abcanz-armies. (Registration is required.)
ABCANZ Standard Number 2105(R) Edition 4. Network Operations Joining, Maintaining and Exiting
Instructions. https://wss.apan.org/cda/abcanz-armies. (Registration is required.)
Committee on National Security Systems Publications are available at:
https://www.cnss.gov/CNSS/issuances/Instructions.cfm. CAC Required.
CNSSI 4005. (U) Safeguarding Communications Security (COMSEC) Facilities and Materials. 22
August 2011.
CNSSI 4009. Committee on National Security Systems (CNSS) Glossary. 6 April 2015.
National Institute of Standards and Technology, Special Publication 800-207.
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf
RECOMMENDED READINGS
ADP 1-01. Doctrine Primer. 31 July 2019.
AR 25-1. Army Information Technology. 15 July 2019.
AR 25-2. Army Cybersecurity. 4 April 2019.
FM 3-94. Armies, Corps, and Division Operations. 23 July 2021.
FM 3-96. Brigade Combat Team. 19 January 2021.
WEBSITES
Army Centralized Army Service Request System Website and Regional Hub Node Playbooks can be
found here: https://acas.army.mil/. (Requires DOD-approved certificate login and user
account.)
Cyber Lessons and Best Practices Website: https://lwn.army.mil/web/cll/home. (Requires DOD-
approved certificate login.)
PRESCRIBED FORMS
This section contains no entries.
REFERENCED FORMS
Unless otherwise indicated, DA forms are available on the Army Publishing Directorate website at
https://armypubs.army.mil/.
DA Form 2028. Recommended Changes to Publications and Blank Forms.
JAMES C. MCCONVILLE
General, United States Army
Chief of Staff
Official:
MARK F. AVERILL
Acting Administrative Assistant
to the Secretary of the Army
2130700
DISTRIBUTION:
Active Army, Army National Guard, and United States Army Reserve. Distributed in
electronic media only (EMO).
PIN: 211307-000